Analysis
-
max time kernel
151s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 22:08
Static task
static1
Behavioral task
behavioral1
Sample
93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exe
Resource
win7-20220812-en
General
-
Target
93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exe
-
Size
1007KB
-
MD5
aecd043c13b2581b4604fdde90f87fae
-
SHA1
a73ceb9f653903fff8fc01c9a8a6ef15e1cbee21
-
SHA256
93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc
-
SHA512
8aeb5988fe2a1ae30b1e891193fe142f3a164d05426bb1445821cc088bf73fb10b718a25fa69bf4135de86c0a69237bd6a3531e9603e28272e3d4d1981c46cae
-
SSDEEP
24576:Bt245+7ErHtRJcDwNHa5m8RnYTUtzFtRR+OSgLphaZ3etWrV:d1TJcDwNOmH+bRC8hm3vV
Malware Config
Extracted
cybergate
v1.07.5
MayMacro
curtis1145.no-ip.org:1145
P1RA63K1N04P7J
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
System32
-
install_file
process
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
The application failed to initialize properly (0xc000007b). Click on OK to terminate the application.
-
message_box_title
Adobe Reader Error
-
password
omolabi
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
UWBCE.cmdUWBCE.cmdpid process 272 UWBCE.cmd 1224 UWBCE.cmd -
Processes:
resource yara_rule behavioral1/memory/1368-94-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/1368-103-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2024-108-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2024-111-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1368-113-0x00000000104F0000-0x0000000010555000-memory.dmp upx behavioral1/memory/1368-119-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1712-124-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1712-126-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1712-127-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Loads dropped DLL 5 IoCs
Processes:
93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exeUWBCE.cmdpid process 2036 93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exe 2036 93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exe 2036 93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exe 2036 93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exe 272 UWBCE.cmd -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
UWBCE.cmddescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run UWBCE.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\KGZNY\\UWBCE.cmd C:\\Users\\Admin\\AppData\\Roaming\\KGZNY\\BDGHM-~1" UWBCE.cmd -
Drops file in System32 directory 2 IoCs
Processes:
RegSvcs.exedescription ioc process File created C:\Windows\SysWOW64\System32\process RegSvcs.exe File opened for modification C:\Windows\SysWOW64\System32\process RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
UWBCE.cmddescription pid process target process PID 1224 set thread context of 1368 1224 UWBCE.cmd RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
UWBCE.cmdRegSvcs.exepid process 1224 UWBCE.cmd 1368 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegSvcs.exepid process 1712 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
explorer.exeRegSvcs.exedescription pid process Token: SeBackupPrivilege 2024 explorer.exe Token: SeRestorePrivilege 2024 explorer.exe Token: SeBackupPrivilege 1712 RegSvcs.exe Token: SeRestorePrivilege 1712 RegSvcs.exe Token: SeDebugPrivilege 1712 RegSvcs.exe Token: SeDebugPrivilege 1712 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
RegSvcs.exepid process 1368 RegSvcs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exeUWBCE.cmdUWBCE.cmdRegSvcs.exedescription pid process target process PID 2036 wrote to memory of 272 2036 93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exe UWBCE.cmd PID 2036 wrote to memory of 272 2036 93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exe UWBCE.cmd PID 2036 wrote to memory of 272 2036 93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exe UWBCE.cmd PID 2036 wrote to memory of 272 2036 93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exe UWBCE.cmd PID 2036 wrote to memory of 272 2036 93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exe UWBCE.cmd PID 2036 wrote to memory of 272 2036 93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exe UWBCE.cmd PID 2036 wrote to memory of 272 2036 93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exe UWBCE.cmd PID 272 wrote to memory of 1224 272 UWBCE.cmd UWBCE.cmd PID 272 wrote to memory of 1224 272 UWBCE.cmd UWBCE.cmd PID 272 wrote to memory of 1224 272 UWBCE.cmd UWBCE.cmd PID 272 wrote to memory of 1224 272 UWBCE.cmd UWBCE.cmd PID 272 wrote to memory of 1224 272 UWBCE.cmd UWBCE.cmd PID 272 wrote to memory of 1224 272 UWBCE.cmd UWBCE.cmd PID 272 wrote to memory of 1224 272 UWBCE.cmd UWBCE.cmd PID 1224 wrote to memory of 960 1224 UWBCE.cmd cmd.exe PID 1224 wrote to memory of 960 1224 UWBCE.cmd cmd.exe PID 1224 wrote to memory of 960 1224 UWBCE.cmd cmd.exe PID 1224 wrote to memory of 960 1224 UWBCE.cmd cmd.exe PID 1224 wrote to memory of 960 1224 UWBCE.cmd cmd.exe PID 1224 wrote to memory of 960 1224 UWBCE.cmd cmd.exe PID 1224 wrote to memory of 960 1224 UWBCE.cmd cmd.exe PID 1224 wrote to memory of 1368 1224 UWBCE.cmd RegSvcs.exe PID 1224 wrote to memory of 1368 1224 UWBCE.cmd RegSvcs.exe PID 1224 wrote to memory of 1368 1224 UWBCE.cmd RegSvcs.exe PID 1224 wrote to memory of 1368 1224 UWBCE.cmd RegSvcs.exe PID 1224 wrote to memory of 1368 1224 UWBCE.cmd RegSvcs.exe PID 1224 wrote to memory of 1368 1224 UWBCE.cmd RegSvcs.exe PID 1224 wrote to memory of 1368 1224 UWBCE.cmd RegSvcs.exe PID 1224 wrote to memory of 1368 1224 UWBCE.cmd RegSvcs.exe PID 1224 wrote to memory of 1368 1224 UWBCE.cmd RegSvcs.exe PID 1224 wrote to memory of 1368 1224 UWBCE.cmd RegSvcs.exe PID 1224 wrote to memory of 1368 1224 UWBCE.cmd RegSvcs.exe PID 1224 wrote to memory of 1368 1224 UWBCE.cmd RegSvcs.exe PID 1224 wrote to memory of 1368 1224 UWBCE.cmd RegSvcs.exe PID 1224 wrote to memory of 1368 1224 UWBCE.cmd RegSvcs.exe PID 1224 wrote to memory of 1368 1224 UWBCE.cmd RegSvcs.exe PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE PID 1368 wrote to memory of 1212 1368 RegSvcs.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exe"C:\Users\Admin\AppData\Local\Temp\93328a4aa25a41f35e203daebefa4f5e7b4eb33e0c3ec65d112c18c3ce1d15cc.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Roaming\KGZNY\UWBCE.cmd"C:\Users\Admin\AppData\Roaming\KGZNY\UWBCE.cmd" "BDGHM-YSR"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Users\Admin\AppData\Roaming\KGZNY\UWBCE.cmdC:\Users\Admin\AppData\Roaming\KGZNY\UWBCE.cmd C:\Users\Admin\AppData\Roaming\KGZNY\YZYJB4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C Start C:\Users\Admin\AppData\Local\Temp\err0cx.exe5⤵PID:960
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"5⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:292
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"6⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5238f5039dbb3c08a51a8a13b47649e43
SHA1afa98c07bbc8b0c875dee332f6a6943313f434b4
SHA256bfe709bb060250cf997846525a65caa955a7757a9b34ed21b396fb8abbf78d0b
SHA512bdda5aa4e508ef30a8626499e1811377a43619422c206d9663b7a54229d800f8bb548eeeae8b66ded63f73fa4b096ceb55dbe5f580fb0090936fc5e823313b89
-
Filesize
5KB
MD5a5869a817982cdeb4d0673514a2dd798
SHA1e38ec6330dd340e656946db2c4af02f93bceee5d
SHA256fb1abbcbd489b83dc0f7564d713c3362daa28c02ae1e643df7a8f82e6bb20ef3
SHA512cb217d53dddcfbfe3722a025b2aad28c6d1f76bb431e2b388e8620f2bf4ff4f0e0f560723ad97d063d9314363039cf9e46802e5759cd8d831b511ea055bc2848
-
Filesize
236KB
MD541b16d19b4354eb477fc86c232e91ce7
SHA1776dba32f6b09d7ebd7484e6fac738482ffd3cdf
SHA256ae6994c77a96eb0849e5dc0c8ba65755b5e38ca2c71e9ade530bb5d85558910e
SHA512e0c62309573d8b6b6fef4bcf7e28bc9d0cf321e6645b3e13ff5b359683d6752b06d372a68eae6535e17389d171373e4de88fd4ee9b550aea997a0b807f6a0c9a
-
Filesize
290KB
MD5cf663a6978cfd3b26b717f9703cc3f1f
SHA1126238976d2be8484c4a36b67267e01a50b8217d
SHA256c7b86d01102590d6b34fd5d3baf64e34258b1d8e0e7dc1ec288c2d5ad808c80f
SHA51294aab3d7dbd3bc735eb86d75920f08c6c5917f82841689bcb82044310b487c428ebbc8febd58bc1b81b2f6b397b969b9afdd620b5fcf5d4ee7fecc326c53bac3
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
32KB
MD5fbc0b5d2f40b268ac7addcf78122525a
SHA130df1420226005ca15039b719b72e72d99c3abd1
SHA256651b8aeedd164bd19183c4a8c1710b613b713ac036154241940fb5a268a3e9b6
SHA512cc67aa6addd4827c4589869d696fdac71206fe154c4aec37da027f9233c7603d4c45bd4373982d3bd62c33970d83504b70113bdfba0b210762d949e14eb55ff7
-
Filesize
118KB
MD5c346f5cd7684d742e218dc717b47c027
SHA1c1486531db25d3c7f86e6a0031342885bd8580b5
SHA256f4277a31ceba382ca8de4d8771e9d12e67dac07c421edbb9dc38be4d843bcb63
SHA51290548e009e967c0151b3330c5070352a5de2e227d61a0695044ebaddad492d2a95a05fbeddb7155b959320ffbfbb0866f091348f8e7927a5810aa8ec2344edaf
-
Filesize
32KB
MD5d79f070423fdd3f01ce8c2ba3fbbc8ed
SHA12f8ed26eb714b4efbe5d7a3167e33ade82c51fd8
SHA25697bd627ebfc4d40b21ebaaed916a1ba53859520edc99537b37d042a0d5425a5a
SHA51247bdc8cce5cd308053d9429a512924448e65023d154b798668d1ee8f628c1b548651e968e7c03db4a6770705f382b9e96db246c39f838000924985b53ccaa3db
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59